aboutsummaryrefslogtreecommitdiffstats
path: root/main/wget/CVE-2017-6508.patch
diff options
context:
space:
mode:
authorSergey Lukin <sergej.lukin@gmail.com>2017-04-05 05:16:36 +0000
committerLeonardo Arena <rnalrd@alpinelinux.org>2017-04-05 10:29:04 +0000
commit1a5ce94c4aa8247104f2ec105fab532c9a6fbeb4 (patch)
tree0aa37af3536df3bf7159f14a13c96ef4637075a1 /main/wget/CVE-2017-6508.patch
parent885ded4dc2c443184a9f7147bedcd32e093d8122 (diff)
downloadaports-1a5ce94c4aa8247104f2ec105fab532c9a6fbeb4.tar.bz2
aports-1a5ce94c4aa8247104f2ec105fab532c9a6fbeb4.tar.xz
main/wget: security fixes #7087
CVE-2017-6508: CRLF injection in the url_parse function in url.c
Diffstat (limited to 'main/wget/CVE-2017-6508.patch')
-rw-r--r--main/wget/CVE-2017-6508.patch25
1 files changed, 25 insertions, 0 deletions
diff --git a/main/wget/CVE-2017-6508.patch b/main/wget/CVE-2017-6508.patch
new file mode 100644
index 0000000000..b685d8dab4
--- /dev/null
+++ b/main/wget/CVE-2017-6508.patch
@@ -0,0 +1,25 @@
+Patch source:
+http://git.savannah.gnu.org/cgit/wget.git/diff/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
+
+diff --git a/src/url.c b/src/url.c
+index 8f8ff0b..7d36b27 100644
+--- a/src/url.c
++++ b/src/url.c
+@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode)
+ url_unescape (u->host);
+ host_modified = true;
+
++ /* check for invalid control characters in host name */
++ for (p = u->host; *p; p++)
++ {
++ if (c_iscntrl(*p))
++ {
++ url_free(u);
++ error_code = PE_INVALID_HOST_NAME;
++ goto error;
++ }
++ }
++
+ /* Apply IDNA regardless of iri->utf8_encode status */
+ if (opt.enable_iri && iri)
+ {